In today's shape-shifting threat landscape, every organization needs the same thing: Real-time, actionable threat intelligence. And there is no shortage of intelligence feeds from reputable third-party sources. But are there too many intelligence feeds for systems and analysts to process? How effectively is actionable threat intelligence being put into practice to improve organizations' abilities to detect and respond to cybersecurity incidents - including when addressing third-party risks?

Help answer these questions and more by participating in the 2017 Actionable Threat Intelligence Survey, sponsored by LookingGlass Cyber Solutions. Take the survey (below) and help us determine:

What is the quantity, quality and accuracy of threat intelligence that organizations currently receive?

What tools and techniques are organizations deploying to automate threat intelligence and put it into action?

What will be the top investment priorities to maximize actionable threat intelligence in 2018?

How do you assess the quality of the threat intelligence your organization currently uses to detect and/or respond to cybersecurity threats?

A- superior

B - above average

C - average

D - below average

F - failing

In the past year, how frequently has threat intelligence played a role in detection of threats that could have impacted your organization?

Often

Occasionally

Rarely

Never

In the past year, how frequently has threat intelligence played a role in detection of third-party risks?

Often

Occasionally

Rarely

Never

In the past year, how frequently has threat intelligence played a role in detection of threats after they have entered your organization?

Often

Occasionally

Rarely

Never

In the past year, what has your organization done to improve the quality and applicability of threat intelligence (check all that apply)?

We have added additional threat intel feeds

We have deployed new tools to automate the collection and deduplication of threat intel

We have deployed new tools to automate the analysis and refinement of threat intel

We have deployed new tools to improve analysis of threat intel

We have deployed additional staff to improve ability to act on threat intel

We have extended our efforts to include detection of third-party threats

Other (please specify):

How do you assess your organization's ability to operationalize threat intelligence?

A- superior

B - above average

C - average

D - below average

F - failing

What today is the single biggest weakness in how your organization acquires or operationalizes threat intelligence?